On Thu, 10 Nov 2022 at 15:47, Ilias Apalodimas
wrote:
>
> [...]
>
> > > > + goto out;
> > > > +
> > > > + ret = efi_open_volume_int(file_info.current_volume, &root);
> > > > + if (ret != EFI_SUCCESS)
> > > > + goto out;
> > > > +
> > > > + ret = efi_file_open_in
[...]
> > > + goto out;
> > > +
> > > + ret = efi_open_volume_int(file_info.current_volume, &root);
> > > + if (ret != EFI_SUCCESS)
> > > + goto out;
> > > +
> > > + ret = efi_file_open_int(root, &f, file_info.current_path,
> > > EFI_FILE_MODE_READ, 0);
> > > +
Hi Ilias,
On Thu, 10 Nov 2022 at 01:04, Ilias Apalodimas
wrote:
>
> Hi Kojima-san
>
>
> On Wed, Nov 09, 2022 at 12:37:27PM +0900, Masahisa Kojima wrote:
> > This commit adds the menu-driven UEFI Secure Boot Key
> > enrollment interface. User can enroll PK, KEK, db
> > and dbx by selecting file.
>
Hi Kojima-san
On Wed, Nov 09, 2022 at 12:37:27PM +0900, Masahisa Kojima wrote:
> This commit adds the menu-driven UEFI Secure Boot Key
> enrollment interface. User can enroll PK, KEK, db
> and dbx by selecting file.
> Only the signed EFI Signature List(s) with an authenticated
> header, typically
This commit adds the menu-driven UEFI Secure Boot Key
enrollment interface. User can enroll PK, KEK, db
and dbx by selecting file.
Only the signed EFI Signature List(s) with an authenticated
header, typically '.auth' file, is accepted.
To clear the PK, KEK, db and dbx, user needs to enroll the nul
5 matches
Mail list logo